Computer Security

The field is developing in significance because of expanding dependence on PC frameworks, the Web and remote systems, for example, Bluetooth and Wi-Fi, and because of the development of "savvy" gadgets, including mobile phones, TVs and the different modest gadgets that establish the Internet of things. Because of its multifaceted nature, both regarding governmental issues and innovation, it is additionally one of the significant difficulties of the contemporary world.

Company Connecting has published a number of articles and videos on Cyber Security which reflect the many different facets of security today.

Our infographic provides a summary of the type of information we hold at Company Connecting. The infographic compares IT companies providing Cyber Security products and services with all the IT & telecoms companies in Scotland.

It's been almost two years since we last published information on Cyber Security Companies. Our last article looked at al the companies with Cyber Security skills on the Company Connecting database. This time we have focused on the 270 Scottish companies with Cyber Security skills. We have almost 4,500 tech companies on our database of which 2,700+ are in Scotland. So about 10% of the Scottish tech companies have some cyber security skills.

In the third in our series from security experts, Anthony McMenzie of Forfusion provides practical advice on Wi-Fi Security.

Earlier this week we learnt that the security protocol used to protect the vast majority of Wi-Fi connections had been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attacks.

CC's first Scotland-specific Cyber Security Infographic. Company Connecting data has previously published Infographics on this topic over a much larger geographical area, and interestingly the results are quite different.

I am writing this on a train using mobile computing devices (a netbook and a phone) and I'm fairly happy with the security measures I've put in place and the procedures I'm using to enable mobile computing, but are these appropriate controls for the majority of people? There is always a risk involved in carrying out business practices outside of an office environment but it's pretty obvious that the advantages of the mobile office in its various forms are such that few of us can constrain our work to just occurring within a traditional office.

It seemed apt to write my first post here on a topic which is becoming increasingly important for businesses: the risk of ransomware. Just as a perpetrator may hold a physical person or thing to ransom, the same applies to a company's data assets and information. Documents, images and other files are encrypted by ransomware using a key that is only held by the attacker. A ransom demand is then made for release of the key so that the victim's files can be decrypted. As with many cyber attacks against businesses or individuals, the mechanism used to mount a ransomware attack is usually through infection of the victim's computer systems with some type of malicious software.